<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 intervlan ADSM/SSH Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965470#M440204</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So this is by design? If I setup an interface for management only and patch it into my switch, would I then be able to manage the asa from any vlan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 01 Jul 2012 21:04:06 GMT</pubDate>
    <dc:creator>vgulinolite</dc:creator>
    <dc:date>2012-07-01T21:04:06Z</dc:date>
    <item>
      <title>ASA 5505 intervlan ADSM/SSH Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965468#M440200</link>
      <description>&lt;P&gt;hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running into a issue that I cannot seem to figure out. I have a asa 5505 with the Security Plus license. I setup a native vlan where all of my network devices sit on. ie my Wireless Access point has an ip of 192.168.3.2, my switch .3. I have no issues managing these devices from any vlan I am on (permitting firewall access rules). When I try to access my ASA via ASDM/SSH. I have to use the gateway of the vlan I am on. For instance. If I am on vlan 10 I have to use 192.168.10.1 for access, if I am on vlan 20 I type 20.1...etc...etc If I type in 192.168.3.1 I get an error in the ASDM logs that states TCP reset by appliance. This is for any gateway I type except for the gateway of the vlan that I am connected to. I am posting a sanitized config. How can I configure the ASA to permit access via any gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965468#M440200</guid>
      <dc:creator>vgulinolite</dc:creator>
      <dc:date>2019-03-11T23:25:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 intervlan ADSM/SSH Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965469#M440203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is how the ASA works. You can only manage the ASA on the interface where you are connected from, not crossing the interface, with one exception if you are trying to manage the ASA via VPN tunnel, then you can manage 1 cross interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2012 04:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965469#M440203</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-01T04:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 intervlan ADSM/SSH Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965470#M440204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So this is by design? If I setup an interface for management only and patch it into my switch, would I then be able to manage the asa from any vlan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Jul 2012 21:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965470#M440204</guid>
      <dc:creator>vgulinolite</dc:creator>
      <dc:date>2012-07-01T21:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 intervlan ADSM/SSH Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965471#M440205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Management-only command just tells the ASA to just pass all the "to the box" traffic which is typically ssh, telnet, http to the ASA. Its not going to alter the behaviour of the ASA and permit management from any vlan. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But like Jennifer said, you can manage that same interface designated as management-only through the vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command for the same is "management-access &lt;INTERFACE designated="" as="" management-only=""&gt;"&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/m.html#wp2027985"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/m.html#wp2027985&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 06:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-intervlan-adsm-ssh-access/m-p/1965471#M440205</guid>
      <dc:creator>Gautam Bhagwandas</dc:creator>
      <dc:date>2012-07-02T06:38:07Z</dc:date>
    </item>
  </channel>
</rss>

